-
1
-
-
77957969195
-
Covert channel research
-
(in Chinese)
-
Wang Yongji, Wu Jingzheng, Zeng Haitao, et al. Covert channel research[J]. Journal of Software, 2010, 21(9): 2262-2288 (in Chinese)
-
(2010)
Journal of Software
, vol.21
, Issue.9
, pp. 2262-2288
-
-
Wang, Y.1
Wu, J.2
Zeng, H.3
-
2
-
-
80052686673
-
Design of secure operating systems with high security levels
-
(in Chinese)
-
Qing Sihan, Shen Changxiang. Design of secure operating systems with high security levels[J]. Science in China: Series E Information Sciences, 2007, 37(2): 238-253 (in Chinese)
-
(2007)
Science in China: Series E Information Sciences
, vol.37
, Issue.2
, pp. 238-253
-
-
Qing, S.1
Shen, C.2
-
3
-
-
12844265899
-
Covert channel analysis in secure operating systems with high security levels
-
(in Chinese)
-
Qing Sihan. Covert channel analysis in secure operating systems with high security levels[J]. Journal of Software. 2004, 15(12): 1837-1849 (in Chinese)
-
(2004)
Journal of Software
, vol.15
, Issue.12
, pp. 1837-1849
-
-
Qing, S.1
-
4
-
-
44449087948
-
A survey of covert channels and countermeasures in computer network protocols
-
Zander S, Armitage G, Branch P. A survey of covert channels and countermeasures in computer network protocols[J]. Communications Surveys & Tutorials, 2007, 9(3): 44-57
-
(2007)
Communications Surveys & Tutorials
, vol.9
, Issue.3
, pp. 44-57
-
-
Zander, S.1
Armitage, G.2
Branch, P.3
-
5
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
New York: ACM
-
Ristenpart T, Tromer E, Shacham H, et al. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds[C] //Proc of CCS'09. New York: ACM, 2009: 199-212
-
(2009)
Proc of CCS'09
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
-
6
-
-
80052666134
-
Identification and evaluation of sharing memory covert timing channel in Xen virtual machines
-
Los Alamitos, CA: IEEE Computer Society
-
Wu Jingzheng, Wang Wongji, Ding Liping, et al. Identification and evaluation of sharing memory covert timing channel in Xen virtual machines[C] //Proc of CLOUD 2011. Los Alamitos, CA: IEEE Computer Society, 2011: 283-291
-
(2011)
Proc of CLOUD 2011
, pp. 283-291
-
-
Wu, J.1
Wang, W.2
Ding, L.3
-
7
-
-
78650158728
-
Determinating timing channels in compute clouds
-
New York: ACM
-
Aviram A, Hu S, Ford B, et al. Determinating timing channels in compute clouds[C] //Proc of CCSW'10. New York: ACM, 2010: 103-108
-
(2010)
Proc of CCSW'10
, pp. 103-108
-
-
Aviram, A.1
Hu, S.2
Ford, B.3
-
8
-
-
0003969633
-
Trusted computer system evaluation criteria
-
NCSC Fort Meade: National Security Agency (NSA)
-
NCSC. Trusted Computer System Evaluation Criteria[S]. Fort Meade: National Security Agency (NSA), 1985
-
(1985)
-
-
-
9
-
-
0003765587
-
Common criteria for information technology security evaluation
-
ISO/IEC Switzerland: ISO
-
ISO/IEC. Common Criteria for Information Technology Security Evaluation[S]. , 2005
-
(2005)
-
-
-
10
-
-
58149161807
-
Information security technology-security techniques requirement for operating system
-
Standardization Administration of the People's Republic of China. Beijing: Standards Press of China, (in Chinese)
-
Standardization Administration of the People's Republic of China. Information Security Technology-Security Techniques Requirement for Operating System[S]. Beijing: Standards Press of China, 2006 (in Chinese)
-
(2006)
-
-
-
11
-
-
80052683831
-
Constructing scenario of event-flag covert channel in secure operating system
-
Los Alamitos, CA: IEEE Computer Society
-
Wu J, Wang Y, Ding L, et al. Constructing scenario of event-flag covert channel in secure operating system[C] //ICIMT'10. Los Alamitos, CA: IEEE Computer Society, 2010: 371-375
-
(2010)
ICIMT'10
, pp. 371-375
-
-
Wu, J.1
Wang, Y.2
Ding, L.3
-
12
-
-
51649119359
-
Covert channel mitigation method for secure real-time database using capacity metric
-
(in Chinese)
-
Zeng Haitao, Wang Yongji, Ruan Li, et al. Covert channel mitigation method for secure real-time database using capacity metric[J]. Journal on Communications, 2008, 20(8): 46-56 (in Chinese)
-
(2008)
Journal on Communications
, vol.20
, Issue.8
, pp. 46-56
-
-
Zeng, H.1
Wang, Y.2
Ruan, L.3
-
13
-
-
65349144517
-
New definition of small message criterion and its application in transaction covert channel mitigating
-
(in Chinese)
-
Zeng Haitao, Wang Yongji, Zu Wei, et al. New definition of small message criterion and its application in transaction covert channel mitigating[J]. Journal of Software, 2009, 20(4): 985-996 (in Chinese)
-
(2009)
Journal of Software
, vol.20
, Issue.4
, pp. 985-996
-
-
Zeng, H.1
Wang, Y.2
Zu, W.3
-
14
-
-
33750931965
-
Run-time detection of covert channels
-
Los Alamitos, CA: IEEE Computer Society
-
Nagatou N, Watanabe T. Run-time detection of covert channels[C] //ARES'06. Los Alamitos, CA: IEEE Computer Society, 2006: 577-584
-
(2006)
ARES'06
, pp. 577-584
-
-
Nagatou, N.1
Watanabe, T.2
-
15
-
-
37749053468
-
Covert channel analysis in secure database systems with high security levels
-
(in Chinese)
-
Wang Baohua, Li Danning, Li Dan, et al. Covert channel analysis in secure database systems with high security levels[J]. Journal of Computer Research and Development, 2006, 43(Suppl): 168-172 (in Chinese)
-
(2006)
Journal of Computer Research and Development
, vol.43
, Issue.SUPPL.
, pp. 168-172
-
-
Wang, B.1
Li, D.2
Li, D.3
-
17
-
-
55949099001
-
A security proof method for multilevel security models
-
(in Chinese)
-
Si Tiange, Tan Zhiyong, Dai Yiqi. A security proof method for multilevel security models[J]. 2008, 45(10): 1711-1717 (in Chinese)
-
(2008)
, vol.45
, Issue.10
, pp. 1711-1717
-
-
Si, T.1
Tan, Z.2
Dai, Y.3
-
18
-
-
0034313810
-
Integrating security and real-time requirements using covert channel capacity
-
Son S, Mukkamala R, DAVID R. Integrating security and real-time requirements using covert channel capacity[J]. IEEE Trans on Knowledge and Data Engineering, 2000, 12(6): 865-879
-
(2000)
IEEE Trans on Knowledge and Data Engineering
, vol.12
, Issue.6
, pp. 865-879
-
-
Son, S.1
Mukkamala, R.2
David, R.3
-
19
-
-
0027848097
-
Database concurrency control in multilevel secure database management systems
-
Keefe T, Tsai W, Srivastava J. Database concurrency control in multilevel secure database management systems[J]. IEEE Trans on Knowledge and Data Engineering, 1993, 5(6): 1039-1055
-
(1993)
IEEE Trans on Knowledge and Data Engineering
, vol.5
, Issue.6
, pp. 1039-1055
-
-
Keefe, T.1
Tsai, W.2
Srivastava, J.3
-
20
-
-
71849083789
-
A study of on/off timing channel based on packet delay distribution
-
Yao L, Zi X, Pan L, et al. A study of on/off timing channel based on packet delay distribution[J]. Computers & Security, 2009, 28(8): 785-794
-
(2009)
Computers & Security
, vol.28
, Issue.8
, pp. 785-794
-
-
Yao, L.1
Zi, X.2
Pan, L.3
-
21
-
-
70349682314
-
TCP/IP timing channels: Theory to implementation
-
New York: IEEE Communications Society
-
Sellke S, Wang C, Bagchi S, et al. TCP/IP timing channels: Theory to implementation[C] //INFOCOM'09. New York: IEEE Communications Society, 2009: 2204-2212
-
(2009)
INFOCOM'09
, pp. 2204-2212
-
-
Sellke, S.1
Wang, C.2
Bagchi, S.3
-
22
-
-
14844330726
-
IP covert timing channels: Design and detection
-
New York: ACM
-
Cabuk S, Brodley C, Shields C. IP covert timing channels: Design and detection[C] //Proc of CCS'04. New York: ACM, 2004: 178-187
-
(2004)
Proc of CCS'04
, pp. 178-187
-
-
Cabuk, S.1
Brodley, C.2
Shields, C.3
-
23
-
-
80052935703
-
Improving performance of network covert timing channel through Huffman coding
-
Seoul, Korea: FTRA
-
Wu J, Wang Y, Ding L, et al. Improving performance of network covert timing channel through Huffman coding[C] //ACSA'10. Seoul, Korea: FTRA, 2010: 512-521
-
(2010)
ACSA'10
, pp. 512-521
-
-
Wu, J.1
Wang, Y.2
Ding, L.3
-
24
-
-
77952331178
-
Detecting covert timing channels: An entropy-based approach
-
New York: ACM
-
Gianvecchio S, Wang H. Detecting covert timing channels: An entropy-based approach[C] //Proc of CCS'07. New York: ACM, 2007: 307-316
-
(2007)
Proc of CCS'07
, pp. 307-316
-
-
Gianvecchio, S.1
Wang, H.2
-
25
-
-
38049087058
-
-
Hanover, NH: Department of Computer Science, Dartmouth College
-
Berk V, Giani A, Cybenko G, et al. Detection of covert channel encoding in network packet delays, TR2005536[R]. Hanover, NH: Department of Computer Science, Dartmouth College, 2005
-
(2005)
Detection of Covert Channel Encoding in Network Packet Delays, TR200553
-
-
Berk, V.1
Giani, A.2
Cybenko, G.3
-
26
-
-
85089791033
-
On the secrecy of timing-based active watermarking trace-back techniques
-
Washington, DC: IEEE Computer Society
-
Peng P, Ning P, Reeves D S. On the secrecy of timing-based active watermarking trace-back techniques[C] //Proc of SP'06. Washington, DC: IEEE Computer Society, 2006: 334-348
-
(2006)
Proc of SP'06
, pp. 334-348
-
-
Peng, P.1
Ning, P.2
Reeves, D.S.3
-
27
-
-
77957960630
-
Research on covert channel measurement and handling in secure real-time database
-
Beijing: Graduate University of Chinese Academy of Sciences, (in Chinese)
-
Zeng Haitao. Research on covert channel measurement and handling in secure real-time database[D]. Beijing: Graduate University of Chinese Academy of Sciences, 2008 (in Chinese)
-
(2008)
-
-
Zeng, H.1
-
28
-
-
76849086598
-
IP covert channel detection
-
Cabuk S, Brodley C E, Shields C. IP covert channel detection[J]. ACM Trans on Information and Systems Security, 2009, 12(4): 1-29
-
(2009)
ACM Trans on Information and Systems Security
, vol.12
, Issue.4
, pp. 1-29
-
-
Cabuk, S.1
Brodley, C.E.2
Shields, C.3
-
29
-
-
0034775025
-
Entropy, entropy rate, and pattern classification as tools to typify complexity in short heart period variability series
-
Porta A, Guzzetti S, Montano N, et al. Entropy, entropy rate, and pattern classification as tools to typify complexity in short heart period variability series[J]. IEEE Trans on Biomedical Engineering, 2001, 48(11): 1282-1291
-
(2001)
IEEE Trans on Biomedical Engineering
, vol.48
, Issue.11
, pp. 1282-1291
-
-
Porta, A.1
Guzzetti, S.2
Montano, N.3
-
30
-
-
0031611375
-
Measuring regularity by means of a corrected conditional entropy in sympathetic outflow
-
Porta A, Baselli G, Liberati D, et al. Measuring regularity by means of a corrected conditional entropy in sympathetic outflow[J]. Biological Cybernetics, 1998, 78(1): 71-78
-
(1998)
Biological Cybernetics
, vol.78
, Issue.1
, pp. 71-78
-
-
Porta, A.1
Baselli, G.2
Liberati, D.3
-
31
-
-
6944244228
-
Managing deadline miss ratio and sensor data freshness in real-time databases
-
Kang K, Son S, Stankovic J. Managing deadline miss ratio and sensor data freshness in real-time databases[J]. IEEE Trans on Knowledge and Data Engineering, 2004, 16(10): 1200-1216
-
(2004)
IEEE Trans on Knowledge and Data Engineering
, vol.16
, Issue.10
, pp. 1200-1216
-
-
Kang, K.1
Son, S.2
Stankovic, J.3
-
32
-
-
46749133616
-
Detecting anomalous access patterns in relational databases
-
Kamra A, Terzi E, Bertino E. Detecting anomalous access patterns in relational databases[J]. The VLDB Journal, 2008, 17(5): 1063-1077
-
(2008)
The VLDB Journal
, vol.17
, Issue.5
, pp. 1063-1077
-
-
Kamra, A.1
Terzi, E.2
Bertino, E.3
-
33
-
-
0033878717
-
Secure concurrency control in firm real-time database systems
-
George B, Haritsa J. Secure concurrency control in firm real-time database systems[J]. Distributed and Parallel Databases, 2000, 8(1): 41-83
-
(2000)
Distributed and Parallel Databases
, vol.8
, Issue.1
, pp. 41-83
-
-
George, B.1
Haritsa, J.2
|